Abstract

The authors describe a set of algorithms for security-constrained optimal power flow (SCOPF) and their configuration in an integrated package for real-time security enhancement. Emphasis is on the SCOPF algorithms and the insights gained from their implementation. As input, the package requires network security and optimization models (built offline) and a network state solution. The output of a single execution, presented to the control center operator, consists of the static security assessment and five different strategies for security enhancement. Each strategy is the solution of a different SCOPF problem, each having a different mix of base case corrective, precontingent preventive and postcontingent corrective action. The SCOPF solutions incorporate base case and contingent state load flow solutions, network switching, staged constraint and control activation, and linear program solutions. The linear program optimizes the convex subproblem and includes a representation of multiple postcontingent networks simultaneously constraining the current operating state. >

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call